secure hill cipher modification shc m n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Secure Hill Cipher Modification SHC-M PowerPoint Presentation
Download Presentation
Secure Hill Cipher Modification SHC-M

Loading in 2 Seconds...

play fullscreen
1 / 9

Secure Hill Cipher Modification SHC-M - PowerPoint PPT Presentation


  • 83 Views
  • Uploaded on

Secure Hill Cipher Modification SHC-M. A.G.Chefranov Eastern Mediterranean University, North Cyprus, Taganrog Institute of Technology, Federal University of South Russia, Russia. Introduction. Hill cipher is very attractive due to its simplicity

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Secure Hill Cipher Modification SHC-M' - shufang-chi


Download Now An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
secure hill cipher modification shc m

Secure Hill Cipher Modification SHC-M

A.G.Chefranov

Eastern Mediterranean University, North Cyprus,

Taganrog Institute of Technology, Federal University of South Russia, Russia

introduction
Introduction
  • Hill cipher is very attractive due to its simplicity
  • Some recent publications devoted to the Hill cipher:
  • Ismail et al., J. Zhejiang Univ SCIENCE A 2006 7(12):2022-2030
  • Thilaka & Rajalakshmi, Cryptologia, 2005, 29:4, 367-376
  • Lin et al., Zhōngguó gōngchéng xuékān  (Zhōngguó gōngchéng xuékān), 2004, vol. 27, no. 5, pp. 743-746 
  • Saeednia, S.: How to Make the Hill Cipher Secure. Cryptologia, Vol. 24. 4 (2000) 353-360
hill cipher
Hill cipher
  • Proposed in 1929
  • C=K·P+B
  • Can be broken in the known plaintext-ciphertext attack
secure hill cipher shc
Secure Hill cipher SHC
  • Proposed by Saeednia, 2000
  • Initial settings. All matrices considered below are m·m sized over Zm, (e.g., m=26 for English language texts). A sender, S, and a receiver, R, share an invertible key matrix K. A plaintext, P, and a cipher-text, C, are also matrices.
  • Encryption. The sender S chooses a permutation, t, over Zm, and, using it, builds a permutation matrix, Mt. For example, if

then

secure hill cipher shc3
Secure Hill cipher SHC
  • Decryption:

The weakness of SHC is in the transfer of the Hill encrypted vector u

via network channels

modification of the secure hill cipher shc m
Modification of the secure Hill cipher SHC-M
  • Initial settings. Shared data: K, SEED
  • Encryption. Sender, S, selects a number, n, and calculates

S->R: C, nxor SEED

  • Decryption. Receiver, R, given n and SEED, calculates t. Having t, calculates Kt. Having Kt and C, calculates the plaintext P
conclusion
Conclusion
  • Thus far, we proposed a modification to SHC which gives more strength to it due to the avoidance of secret information transfer via network channels. In our approach, only the number of a permutation is transferred (together with a cipher-text)